Dissertationen zum Thema „Digital communications Reliability Mathematics“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-18 Dissertationen für die Forschung zum Thema "Digital communications Reliability Mathematics" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Britton, Matthew Scott. „Stochastic task scheduling in time-critical information delivery systems“. Title page, contents and abstract only, 2003. http://web4.library.adelaide.edu.au/theses/09PH/09phb8629.pdf.
Der volle Inhalt der QuelleEllis, David Lambert. „The reliability and efficiency of serial digital data in industrial communications“. Thesis, Liverpool John Moores University, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.247334.
Der volle Inhalt der QuelleHassanien, Mohamed A. M. „Error rate performance metrics for digital communications systems“. Thesis, Swansea University, 2011. https://cronfa.swan.ac.uk/Record/cronfa42497.
Der volle Inhalt der QuelleLi, Cheng, und 李鋮. „Carrier frequency offset estimation for multicarrier communications“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29725331.
Der volle Inhalt der QuelleYi, Eun-jik. „Applications of wavelets to nonlinear wave analysis and digital communication /“. Digital version accessible at:, 2000. http://wwwlib.umi.com/cr/utexas/main.
Der volle Inhalt der QuelleGiddens, Spencer. „Applications of Mathematical Optimization Methods to Digital Communications and Signal Processing“. BYU ScholarsArchive, 2020. https://scholarsarchive.byu.edu/etd/8601.
Der volle Inhalt der QuelleShepherd, David. „Optimisation of iterative multi-user receivers using analytical tools /“. View thesis entry in Australian Digital Theses Program, 2008. http://thesis.anu.edu.au/public/adt-ANU20081114.221408/index.html.
Der volle Inhalt der QuelleVafi, Sina. „On the design of turbo codes with convolutional interleavers“. Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060515.092832/index.html.
Der volle Inhalt der QuelleShaheem, Asri. „Iterative detection for wireless communications“. University of Western Australia. School of Electrical, Electronic and Computer Engineering, 2008. http://theses.library.uwa.edu.au/adt-WU2008.0223.
Der volle Inhalt der QuellePratt, Brian Hogan. „Analysis and Mitigation of SEU-induced Noise in FPGA-based DSP Systems“. BYU ScholarsArchive, 2011. https://scholarsarchive.byu.edu/etd/2482.
Der volle Inhalt der QuelleDua, Akshay. „Trust-but-Verify: Guaranteeing the Integrity of User-generated Content in Online Applications“. PDXScholar, 2013. https://pdxscholar.library.pdx.edu/open_access_etds/1425.
Der volle Inhalt der QuelleOliveira, Lucas de. „Impacto da utilização de tecnicas de lifting explorando diferença entre ferramentas interpretada e compilada na velocidade computacional da codificação wavelet de imagens estaticas“. [s.n.], 2009. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260073.
Der volle Inhalt der QuelleDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-14T10:02:55Z (GMT). No. of bitstreams: 1 Oliveira_Lucasde_M.pdf: 5052260 bytes, checksum: 34b1fa9e0e25d00990c118c6c93f964c (MD5) Previous issue date: 2009
Resumo: O campo de análise e compressão de imagens tem recebido especial atenção da comunidade científica recentemente por abranger os principais sistemas de TV digital, comunicações via satélite e comunicações móveis. Neste contexto, as Transformadas Wavelets Discretas (TWD) surgem como uma ferramenta poderosa e suas inúmeras vantagens permitiram sua inserção em importantes padrões tais como JPEG2000, MPEG4 e MPEG7. O método lifting realiza a TWD sub-amostrando o sinal antes do processo de filtragem, implicando em rápido processamento por fazer uso das similaridades entre filtros passa-alta e passa-baixa, acelerando o cálculo dos coeficientes. Na literatura, ganhos aritméticos teóricos de diferentes proporções foram obtidos sobre o método tradicional, destacando-se os trabalhos de Daubechies e Sweldens e de Reichel. O objetivo desta pesquisa consiste em estender esta discussão de resultados teóricos quando implementados através de ferramentas, interpretada e compilada, focando no tempo de processamento necessário para a realização (decomposição e reconstrução) de diferentes imagens estáticas empregando wavelets pertencentes às famílias de Daubechies, Symlets e Biortogonais. Medidas de PSNR foram utilizadas de forma a corroborar a perfeita implementação do lifting, dado que o mesmo não pode implicar em deterioração na imagem reconstruída.
Abstract: The field of analysis and compression of images has been received special attention of the scientific community because of including in the main systems of digital TV, satellite communications and mobile communications. In this context, the Discrete Transform Wavelet (TWD) arise how a powerful tool and its many advantages allowed your insertion in important standards such as JPEG2000, MPEG4 and MPEG7. The lifting method realizes the TWD sub-sampling the signal before the filtering, resulting in faster processing by using the similarities between high and low pass filters, speeding up the calculation of coefficients. In the literature, arithmetic theoretical gains of different proportions were obtained on the traditional method, especially the works of Daubechies and Sweldens and of Reichel. The objective of this research is to extend this discussion of theoretical results when implemented through tools, interpreted and compiled, targeting the processing time required to perform (decomposition and reconstruction) of different images using wavelets belonging to the families of Daubechies, and Symlets Biortogonais. Measures of PSNR were used to corroborate the perfect implementation of the lifting, since that cannot result in deterioration in the reconstructed image.
Mestrado
Telecomunicações e Telemática
Mestre em Engenharia Elétrica
„Combating channels with long impulse response using combined turbo equalization and turbo decoding“. 2000. http://library.cuhk.edu.hk/record=b5890402.
Der volle Inhalt der QuelleThesis (M.Phil.)--Chinese University of Hong Kong, 2000.
Includes bibliographical references (leaves 56-[59]).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Communications and Coding Technology --- p.2
Chapter 1.2 --- The Emerge of Turbo Codes --- p.3
Chapter 1.3 --- The Extension of Turbo Principle --- p.3
Chapter 1.4 --- Receiver Structures for Practical Situations --- p.4
Chapter 1.5 --- Thesis Overview --- p.5
Chapter 2 --- ISI Channel Model and Channel Equalization --- p.6
Chapter 2.1 --- A Discrete Time ISI Channel Model --- p.6
Chapter 2.1.1 --- Optimum Maximum Likelihood Receiver --- p.8
Chapter 2.1.2 --- The Whitened Matched Filter --- p.11
Chapter 2.2 --- Equalization Techniques for Combating ISI --- p.13
Chapter 2.2.1 --- Linear MMSE Equalizer --- p.13
Chapter 2.2.2 --- MLSE Equalizer in Viterbi Algorithm --- p.15
Chapter 3 --- An Overview of Turbo Codes --- p.18
Chapter 3.1 --- The Turbo Encoder --- p.19
Chapter 3.2 --- The Turbo Interleaver --- p.21
Chapter 3.3 --- The Iterative Decoder --- p.22
Chapter 3.3.1 --- The MAP Algorithm --- p.23
Chapter 3.3.2 --- The Max-Log MAP Algorithm --- p.25
Chapter 3.3.3 --- The Log-MAP Algorithm --- p.28
Chapter 4 --- Receivers for Channels with Long Impulse Responses --- p.29
Chapter 4.1 --- Shortcomings for the Existing Models --- p.30
Chapter 4.2 --- Proposed System Architecture --- p.30
Chapter 4.2.1 --- Optimized Model for Channel Shortening Filter --- p.31
Chapter 4.2.2 --- Method One - Separate Trellises for EQ and DEC --- p.35
Chapter 4.2.3 --- Method Two - Combined Trellises for EQ and DEC --- p.37
Chapter 5 --- Performance Analysis --- p.40
Chapter 5.1 --- Simulation Model and Settings --- p.40
Chapter 5.2 --- Performance Expectations --- p.43
Chapter 5.3 --- Simulation Results and Discussions --- p.49
Chapter 6 --- Concluding Remarks --- p.55
Bibliography --- p.56
Ogundile, Olanyika Olaolu. „Symbol level decoding of Reed-Solomon codes with improved reliability information over fading channels“. Thesis, 2016. http://hdl.handle.net/10539/21060.
Der volle Inhalt der QuelleReliable and e cient data transmission have been the subject of current research, most especially in realistic channels such as the Rayleigh fading channels. The focus of every new technique is to improve the transmission reliability and to increase the transmission capacity of the communication links for more information to be transmitted. Modulation schemes such as M-ary Quadrature Amplitude Modulation (M-QAM) and Orthogonal Frequency Division Multiplexing (OFDM) were developed to increase the transmission capacity of communication links without additional bandwidth expansion, and to reduce the design complexity of communication systems. On the contrary, due to the varying nature of communication channels, the message transmission reliability is subjected to a couple of factors. These factors include the channel estimation techniques and Forward Error Correction schemes (FEC) used in improving the message reliability. Innumerable channel estimation techniques have been proposed independently, and in combination with di erent FEC schemes in order to improve the message reliability. The emphasis have been to improve the channel estimation performance, bandwidth and power consumption, and the implementation time complexity of the estimation techniques. Of particular interest, FEC schemes such as Reed-Solomon (RS) codes, Turbo codes, Low Density Parity Check (LDPC) codes, Hamming codes, and Permutation codes, are proposed to improve the message transmission reliability of communication links. Turbo and LDPC codes have been used extensively to combat the varying nature of communication channels, most especially in joint iterative channel estimation and decoding receiver structures. In this thesis, attention is focused on using RS codes to improve the message reliability of a communication link because RS codes have good capability of correcting random and burst errors, and are useful in di erent wireless applications. This study concentrates on symbol level soft decision decoding of RS codes. In this regards, a novel symbol level iterative soft decision decoder for RS codes based on parity-check equations is developed. This Parity-check matrix Transformation Algorithm (PTA) is based on the soft reliability information derived from the channel output in order to perform syndrome checks in an iterative process. Performance analysis verify that this developed PTA outperforms the conventional RS hard decision decoding algorithms and the symbol level Koetter and Vardy (KV ) RS soft decision decoding algorithm. In addition, this thesis develops an improved Distance Metric (DM) method of deriving reliability information over Rayleigh fading channels for combined demodulation with symbol level RS soft decision decoding algorithms. The newly proposed DM method incorporates the channel state information in deriving the soft reliability information over Rayleigh fading channels. Analysis verify that this developed metric enhances the performance of symbol level RS soft decision decoders in comparison with the conventional method. Although, in this thesis, the performance of the developed DM method of deriving soft reliability information over Rayleigh fading channels is only veri ed for symbol level RS soft decision decoders, it is applicable to any symbol level soft decision decoding FEC scheme. Besides, the performance of the all FEC decoding schemes plummet as a result of the Rayleigh fading channels. This engender the development of joint iterative channel estimation and decoding receiver structures in order to improve the message reliability, most especially with Turbo and LDPC codes as the FEC schemes. As such, this thesis develops the rst joint iterative channel estimation and Reed- Solomon decoding receiver structure. Essentially, the joint iterative channel estimation and RS decoding receiver is developed based on the existing symbol level soft decision KV algorithm. Consequently, the joint iterative channel estimation and RS decoding receiver is extended to the developed RS parity-check matrix transformation algorithm. The PTA provides design ease and exibility, and lesser computational time complexity in an iterative receiver structure in comparison with the KV algorithm. Generally, the ndings of this thesis are relevant in improving the message transmission reliability of a communication link with RS codes. For instance, it is pertinent to numerous data transmission technologies such as Digital Audio Broadcasting (DAB), Digital Video Broadcasting (DVB), Digital Subscriber Line (DSL), WiMAX, and long distance satellite communications. Equally, the developed, less computationally intensive, and performance e cient symbol level decoding algorithm for RS codes can be use in consumer technologies like compact disc and digital versatile disc.
GS2016
Britton, Matthew Scott. „Stochastic task scheduling in time-critical information delivery systems / Matthew Britton“. Thesis, 2003. http://hdl.handle.net/2440/21899.
Der volle Inhalt der QuelleIncludes bibliographical references (leaves 120-129)
x, 129 leaves : ill. ; 30 cm.
Presents performance analyses of dynamic, stochastic task scheduling policies for a real- time-communications system where tasks lose value as they are delayed in the system.
Thesis (Ph.D.)--University of Adelaide, Dept. of Electrical and Electronic Engineering, 2003
Tong, Jian. „Active optical filters based integrated photonic circuits /“. 2006. http://proquest.umi.com/pqdweb?did=1225139861&sid=1&Fmt=2&clientId=10361&RQT=309&VName=PQD.
Der volle Inhalt der QuelleBENACEM, Lucien. „Cooperative DVB-H: Raptor-Network Coding Protocols for Reliable and Energy Efficient Multimedia Communications“. Thesis, 2010. http://hdl.handle.net/1974/5955.
Der volle Inhalt der QuelleThesis (Master, Electrical & Computer Engineering) -- Queen's University, 2010-08-03 19:45:54.943
Rangwala, Mohammed M. „Secure Digital Provenance: Challenges and a New Design“. Thesis, 2014. http://hdl.handle.net/1805/6051.
Der volle Inhalt der QuelleDerived from the field of art curation, digital provenance is an unforgeable record of a digital object's chain of successive custody and sequence of operations performed on the object. It plays an important role in accessing the trustworthiness of the object, verifying its reliability and conducting audit trails of its lineage. Digital provenance forms an immutable directed acyclic graph (DAG) structure. Since history of an object cannot be changed, once a provenance chain has been created it must be protected in order to guarantee its reliability. Provenance can face attacks against the integrity of records and the confidentiality of user information, making security an important trait required for digital provenance. The digital object and its associated provenance can have different security requirements, and this makes the security of provenance different from that of traditional data. Research on digital provenance has primarily focused on provenance generation, storage and management frameworks in different fields. Security of digital provenance has also gained attention in recent years, particularly as more and more data is migrated in cloud environments which are distributed and are not under the complete control of data owners. However, there still lacks a viable secure digital provenance scheme which can provide comprehensive security for digital provenance, particularly for generic and dynamic ones. In this work, we address two important aspects of secure digital provenance that have not been investigated thoroughly in existing works: 1) capturing the DAG structure of provenance and 2) supporting dynamic information sharing. We propose a scheme that uses signature-based mutual agreements between successive users to clearly delineate the transition of responsibility of the digital object as it is passed along the chain of users. In addition to preserving the properties of confidentiality, immutability and availability for a digital provenance chain, it supports the representation of DAG structures of provenance. Our scheme supports dynamic information sharing scenarios where the sequence of users who have custody of the document is not predetermined. Security analysis and empirical results indicate that our scheme improves the security of the typical secure provenance schemes with comparable performance.